Sciweavers

1446 search results - page 195 / 290
» Formal analysis of hardware requirements
Sort
View
IDTRUST
2010
ACM
14 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
BTW
2007
Springer
123views Database» more  BTW 2007»
14 years 3 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
ESWS
2007
Springer
14 years 3 months ago
Media, Politics and the Semantic Web
The media play an important role in the functioning of our society. This role is extensively studied by Communication Scientists, requiring a systematic analysis of media content. ...
Wouter van Atteveldt, Stefan Schlobach, Frank van ...
FMCAD
2007
Springer
14 years 3 months ago
Exploiting Resolution Proofs to Speed Up LTL Vacuity Detection for BMC
—When model-checking reports that a property holds on a model, vacuity detection increases user confidence in this result by checking that the property is satisfied in the inte...
Jocelyn Simmonds, Jessica Davies, Arie Gurfinkel, ...
UML
2004
Springer
14 years 2 months ago
SoftContract: Model-Based Design of Error-Checking Code and Property Monitors
This paper discusses a model-based design flow for requirements in distributed embedded software development. Such requirements are specified using a language similar to Linear T...
Luciano Lavagno, Marco Di Natale, Alberto Ferrari,...